Jonathan Griffin

According to our database1, Jonathan Griffin authored at least 11 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation.
Proceedings of the 13th International Workshop on Automating Test Case Design, 2022

2020
PolyFit: perception-aligned vectorization of raster clip-art via intermediate polygonal fitting.
ACM Trans. Graph., 2020

Pac-Euglena: A Living Cellular Pac-Man Meets Virtual Ghosts.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2018
Exchangeability martingales for selecting features in anomaly detection.
Proceedings of the 7th Symposium on Conformal and Probabilistic Prediction and Applications, 2018

2016
Access to Research: An innovative and successful initiative by the UK publishing industry.
Learn. Publ., 2016

2012
Optimizing Network Patching Policy Decisions.
Proceedings of the Information Security and Privacy Research, 2012

2009
Using security metrics coupled with predictive modeling and simulation to assess security processes.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Assessing the Value of Investments in Network Security Operations: A Systems Analytics Approach.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007


  Loading...